-
Notifications
You must be signed in to change notification settings - Fork 406
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reducing MSYS_1_BLOCK_SIZE breaks SC Pairing DH key exchange #1662
Comments
My hypothesis: this is due to how the m_bufs are managed. |
Hi, Do you tune MSYS_1_BLOCK_SIZE ? Default 292 should be fine for LE SC. |
Yeah I was using the provided sample app bleprp, which sets it to 110. I can see the problem now. |
Hi @sacca97, when do you plan to land the PR ? :) |
Hey I've been a bit overwhelmend and also forgot abt it. I have made some changes in my fork but could not test it properly yet (it works in the case of the MSYS_1_BLOCK_SIZE=110 as in the blehr app at least). |
Edit:
When reducing the MSYS_1_BLOCK_SIZE (e.g., 110 as in the bleprph app) the current way of filling the mbuf does not work as intended when trying to write >60 bytes of data (DH PubKey in SC), and the result is a randomly filled mbuf which causes the handshake to abort.
The solution here would be to use the
_copyinto
function to fill the buffer.The text was updated successfully, but these errors were encountered: